Empowering Malware Detection Efficiency within Processing-in-Memory Architecture Authors: Sreenitha Kasarapu, Sathwika Bavikadi, Sai Manoj Pudukotai Dinakarrao | Published: 2024-04-12 WatermarkingMalware ClassificationComputational Efficiency 2024.04.12 2025.05.27 Literature Database
Privacy preserving layer partitioning for Deep Neural Network models Authors: Kishore Rajasekar, Randolph Loh, Kar Wai Fok, Vrizlynn L. L. Thing | Published: 2024-04-11 WatermarkingPrivacy Protection MethodComputational Efficiency 2024.04.11 2025.05.27 Literature Database
Accurate Low-Degree Polynomial Approximation of Non-polynomial Operators for Fast Private Inference in Homomorphic Encryption Authors: Jianming Tong, Jingtian Dang, Anupam Golder, Callie Hao, Arijit Raychowdhury, Tushar Krishna | Published: 2024-04-04 | Updated: 2024-05-07 WatermarkingModel Performance EvaluationComputational Efficiency 2024.04.04 2025.05.27 Literature Database
Fluent: Round-efficient Secure Aggregation for Private Federated Learning Authors: Xincheng Li, Jianting Ning, Geong Sen Poh, Leo Yu Zhang, Xinchun Yin, Tianwei Zhang | Published: 2024-03-10 Computational EfficiencyCommunication EfficiencyFederated Learning 2024.03.10 2025.05.27 Literature Database
OPAF: Optimized Secure Two-Party Computation Protocols for Nonlinear Activation Functions in Recurrent Neural Network Authors: Qian Feng, Zhihua Xia, Zhifeng Xu, Jiasi Weng, Jian Weng | Published: 2024-03-01 Multi-Party ComputationComputational EfficiencyCommunication Efficiency 2024.03.01 2025.05.27 Literature Database
Advancing SQL Injection Detection for High-Speed Data Centers: A Novel Approach Using Cascaded NLP Authors: Kasim Tasdemir, Rafiullah Khan, Fahad Siddiqui, Sakir Sezer, Fatih Kurugollu, Sena Busra Yengec-Tasdemir, Alperen Bolat | Published: 2023-12-20 SQL Injection Attack DetectionWatermarkingComputational Efficiency 2023.12.20 2025.05.27 Literature Database
Rethinking Randomized Smoothing from the Perspective of Scalability Authors: Anupriya Kumari, Devansh Bhardwaj, Sukrit Jindal | Published: 2023-12-19 | Updated: 2024-10-24 Scalability AnalysisRobustness EvaluationComputational Efficiency 2023.12.19 2025.05.27 Literature Database
Hot PATE: Private Aggregation of Distributions for Diverse Task Authors: Edith Cohen, Benjamin Cohen-Wang, Xin Lyu, Jelani Nelson, Tamas Sarlos, Uri Stemmer | Published: 2023-12-04 | Updated: 2024-05-17 WatermarkingPrivacy Protection MethodComputational Efficiency 2023.12.04 2025.05.28 Literature Database
Scalable kernel balancing weights in a nationwide observational study of hospital profit status and heart attack outcomes Authors: Kwangho Kim, Bijan A. Niknam, José R. Zubizarreta | Published: 2023-11-01 Threats of Medical AISelection and Evaluation of Optimization AlgorithmsComputational Efficiency 2023.11.01 2025.05.28 Literature Database
Unified Enhancement of Privacy Bounds for Mixture Mechanisms via $f$-Differential Privacy Authors: Chendi Wang, Buxin Su, Jiayuan Ye, Reza Shokri, Weijie J. Su | Published: 2023-10-30 | Updated: 2023-11-01 Privacy TechniqueRobustness EvaluationComputational Efficiency 2023.10.30 2025.05.28 Literature Database